CN105553980A - Safety fingerprint identification system and method based on cloud computing - Google Patents

Safety fingerprint identification system and method based on cloud computing Download PDF

Info

Publication number
CN105553980A
CN105553980A CN201510946531.4A CN201510946531A CN105553980A CN 105553980 A CN105553980 A CN 105553980A CN 201510946531 A CN201510946531 A CN 201510946531A CN 105553980 A CN105553980 A CN 105553980A
Authority
CN
China
Prior art keywords
fingerprint
vector
verified
cloud server
sample
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510946531.4A
Other languages
Chinese (zh)
Inventor
曹文强
张子剑
王峰
李帅
刘嵩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
UNIT 91655 OF PLA
Beijing Institute of Technology BIT
Original Assignee
UNIT 91655 OF PLA
Beijing Institute of Technology BIT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by UNIT 91655 OF PLA, Beijing Institute of Technology BIT filed Critical UNIT 91655 OF PLA
Priority to CN201510946531.4A priority Critical patent/CN105553980A/en
Publication of CN105553980A publication Critical patent/CN105553980A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0861Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Abstract

The invention discloses a safety fingerprint identification system and method based on cloud computing. The system comprises three parts: a client, a database owner and a cloud server, wherein the client extracts a fingerprint image as a vector with a fixed length by a fingerprint vector extraction algorithm API (Application Programming Interface), and loads the vector to the database owner; when receiving the sample fingerprint vector from the client, the database owner encrypts the sample fingerprint vector and loads the sample fingerprint vector to the cloud server for storage; when receiving a fingerprint vector to be verified, the database owner encrypts the fingerprint vector to be verified and loads the fingerprint vector to be verified to the cloud server; when receiving encrypted sample fingerprint information, the cloud server stores the encrypted sample fingerprint information; and when the cloud server receives encrypted fingerprint information to be verified, the cloud server carries out matching computation on data in the information and data in the stored fingerprint information to be verified and returns an index, the database owner searches the corresponding sample fingerprint vector according to the index and returns a result to the client.

Description

Based on security fingerprint recognition system and the method for cloud computing
Technical field
The present invention relates to a kind of security fingerprint recognition system based on cloud computing, particularly relate to a kind of system taking into account fingerprint secret protection and recognition efficiency in large-scale application environment.
Background technology
Along with the develop rapidly of biometrics identification technology, fingerprint identification technology is one of main direction of studying becoming society.But because current fingerprint identification technology varies, this greatly limits the development of this technology to large-scale application.In recent years, along with based on Fingercode fingerprint characteristic vector extraction algorithm increasingly mature, people can utilize this algorithm fingerprint image to be extracted as the fingerprint vector of regular length, realize the compatibility between distinct device, for the large-scale application of fingerprint identification technology provides the foundation.Cloud platform has powerful calculating and storage capacity, considers the fingerprint vector of substantial amounts in large-scale application, and increasing enterprise tends to the storage in fingerprint recognition and evaluation work to be contracted out to cloud platform.
But thing followed safety problem also threatens the safety of finger print information, enterprise is hung back to use cloud computing when selecting fingerprint identification technology.Because fingerprint vector is deposited in incredible environment by cloud computing, carried out the feedback of the calculation and demonstration result of fingerprint vector by insincere cloud service provider, serious threat is brought to the fail safe of fingerprint and confidentiality.If encryption technology safely and efficiently can be adopted to be encrypted it before fingerprint vector uploads to Cloud Server, fail safe and the confidentiality of fingerprint vector can be ensured well, no matter be that fingerprint vector information all can not be stolen by eavesdropping opponent or incredible cloud computing provider.Under cloud computing environment, while ensureing fingerprint secret protection, how to improve the efficiency of fingerprint recognition, this has become one of fingerprint recognition bottleneck moving towards large-scale application.
Owing to can not properly settle secret protection and the efficiency of fingerprint under cloud computing, current existing fingerprint recognition system, does not all use cloud computing effectively store fingerprint vector and calculate.
Summary of the invention
The object of the invention is the defect existed when using cloud computing for existing fingerprint recognition system, proposing a kind of security fingerprint recognition system based on cloud computing.By the efficient encipherment scheme of use safety and effective fingerprinting scheme, while ensureing fingerprint vector safety, solve the checking identification of fingerprint under ciphertext environment, enable cloud computing serve fingerprint recognition system.This system can to provide safeguard the fingerprint identification technology of fingerprint privacy and efficiency for enterprises and institutions.
The object of the invention is to be achieved through the following technical solutions.
Based on the security fingerprint recognition system of cloud computing, comprise client, database owner and Cloud Server three part.Wherein client is extendible third party, in order to the vector that takes the fingerprint, can be arranged on multiple host; Database owner is believable local module, is responsible for and the communicating of client and Cloud Server, the encryption that can complete fingerprint vector with upload; Cloud Server is incredible third party, is responsible for the sample fingerprint information after storage encryption, completes the identification authentication function of fingerprint for finger print information to be verified.
Client, is configured with vectorial extraction module, by fingerprint vector extraction algorithm API, fingerprint image is extracted as the vector of regular length and is uploaded to database owner;
Database owner, be configured with fingerprint vector encrypting module, this module comprises sample fingerprint encryption submodule and encrypting fingerprint submodule to be verified, when receiving sample fingerprint vector from client, utilizes sample fingerprint encryption submodule to be encrypted and be uploaded to Cloud Server and stores; When receiving fingerprint vector to be verified, encrypting fingerprint submodule to be verified is utilized to be encrypted and to be uploaded to Cloud Server; Cloud Server, the information that is configured with stores and matching primitives module, stores when receiving the sample fingerprint vector information after encryption from database owner; When receiving the fingerprint vector information to be verified after encryption, data in the fingerprint vector information to be verified of the data in this fingerprint vector information to be verified received and storage are carried out matching primitives, return index, database owner finds out corresponding sample fingerprint vector according to this index, Euclidean distance computing is carried out with fingerprint vector to be verified, and compare with threshold value, return results to client.
Described fingerprint vector encrypting module uses and comprises the encipherment scheme of sample fingerprint vector and the encipherment scheme of fingerprint vector to be verified by the biometric information secret protection scheme (EfficientPrivacy-PreservingBiometricIdentificationinClou dComputing) of the people such as JiaweiYuan under the cloud computing of proposition in 2013 to the encipherment scheme of fingerprint vector.
When carrying out fingerprint register, first by extraction algorithm, process being carried out to fingerprint image and obtaining sample fingerprint vector b=[b 1, b 2,, b n], its (n+1) position is expanded to obtain vectorial b s.The matrix A of stochastic generation (n+1) × (n+1), makes D=[A 1* b s1, A 2* b s2,, A n+1* b s (n+1)], sample fingerprint vector is just hidden in matrix D thus.Database owner's module carries out following operation to its sample fingerprint information:
C h i = C H × C i = H × M 1 - 1 × M 1 × D × M 2 = H × D × M 2 C R = M 2 - 1 × R T I n d e x I n d e x
Wherein M 1, M 2, H, R are the key of system.M 1, M 2for the matrix of (n+1) × (n+1), H, R are the random vector that (n+1) ties up, and Index is the index that sample fingerprint vector is corresponding.By these information (C hi, C r, Index) be uploaded to Cloud Server and store after packing.
When carrying out fingerprint authentication, first by extraction algorithm, process being carried out to fingerprint image and obtaining fingerprint vector b=[b to be verified 1, b 2,, b n], its (n+1) position is carried out expanding to b n+1=1, obtain vectorial b c.The matrix E of stochastic generation (n+1) × (n+1), makes F e=[E 1* b c1, E 2* b c2..., E n+1* b c (n+1)], fingerprint vector to be verified is hidden in matrix F thus cin.In database owner's module, the finger print information to be verified after encryption is proceeded as follows:
C F = M 1 - 1 × k × F c × M a
Wherein M 1, M 2for the key of system, the arbitrary constant generated when k is for verifying at every turn.Upon the authentication, by C fbe uploaded to Cloud Server, carry out matching primitives with the sample fingerprint information stored.
When carrying out the checking identification of fingerprint, definition relative distance:
P se=C hi×C F×C R
For each sample fingerprint information that Cloud Server stores, formula can obtain a relative distance thus, calculates the difference of any two relative distances:
P ic-P zc=0.5k(dist zc-dist ic)
The difference of known relative distance is the inverse value of the difference of the Euclidean distance of 0.5 times.Therefore the sample fingerprint vector that known relative distance is maximum is the minimum sample fingerprint vector of Euclidean distance.
Described database owner side encrypting module is responsible for all fingerprint vector carry out different encryptions according to registration from checking and be uploaded to Cloud Server.
Sample fingerprint information after the deciphering module of described Cloud Server is responsible for the encryption that the finger print information to be verified after by encryption and Cloud Server store carries out matching primitives, finds out the index of the sample fingerprint of closest fingerprint to be verified.
The annexation of above-mentioned part is:
Client to take the fingerprint vector to fingerprint image, be uploaded to the encryption that database owner carries out fingerprint vector, after having encrypted, the information after encryption is uploaded to Cloud Server, Cloud Server completes storage or the matching primitives of data according to different demands, and index is fed back to database owner.Database owner finds out corresponding sample fingerprint vector according to index, calculates Euclidean distance and compared with threshold value, result feedback is to client the most at last with fingerprint vector to be verified.
Beneficial effect
Compared with common fingerprint recognition system, the present invention uses cloud computing technology to carry out store and management easily and effectively to fingerprint register and identifying, by the efficient encipherment scheme of use safety, fail safe and the confidentiality of finger print information are ensured, use cloud computing to improve the efficiency of checking identification, for enterprise provides fingerprint recognition system safely and efficiently simultaneously.
Accompanying drawing explanation
Fig. 1 is system architecture diagram;
Fig. 2 is the concrete composition frame chart of system.
Embodiment
Below in conjunction with accompanying drawing, further full and accurate explanation is done to the specific embodiment of the present invention.
Based on the security fingerprint encryption system of cloud computing, comprise client, database owner and Cloud Server.Wherein, client as extendible third party, to fingerprint image take the fingerprint vector function and uploaded, can be arranged on multiple host, increase the extensibility of system.
Database owner's module is believable local module, is configured with the encrypting module of fingerprint vector, completes the encryption function of fingerprint vector, realizes and the communicating of client and Cloud Server.
Cloud Server is configured with deciphering module, and owner communicates with client, realizes the storage of encryption sample fingerprint and the identification authentication function of encryption fingerprint to be verified.
The course of work of native system is as follows:
First be the registration process of fingerprint.
User carries out the registration of fingerprint by being arranged on local database owner.Concrete, after input fingerprint image, database owner first extracts the fingerprint vector of regular length from fingerprint picture, this sample fingerprint vector is stored in this module, and is encrypted this vector by sample fingerprint cryptographic algorithm.By information (C after having encrypted hi, C r, Index) and packing is uploaded to Cloud Server, and simultaneously user can the essential information of typing oneself.
Cloud Server stores after receiving the package information that database owner uploads, and the mode of operation of correspondence is returned to database owner.
Being uploaded to Cloud Server by operating the finger print information after by multiple encryption above, realizing the registration of fingerprint.
Then be the proof procedure of fingerprint.
User can carry out the checking of fingerprint by the client be arranged on multiple host.Concrete, after input fingerprint image, client extracts the fingerprint vector of regular length by vectorial extraction algorithm API, and information is uploaded to database owner.After database owner receives, call fingerprint vector cryptographic algorithm to be verified and it is encrypted obtains C fand be uploaded to Cloud Server.After cloud server to this information, call deciphering module, carry out matching primitives with the sample fingerprint information stored respectively, return index to database owner.
Described decrypting process comprises the following steps:
Suppose Cloud Server stored n encryption after sample fingerprint information, to choose now a fingerprint image and verify.Client utilizes vectorial extraction algorithm can extract fingerprint vector to be verified for b=[b 1, b 2,, b n], the cryptographic algorithm calling finger print information to be verified can obtain C f, be uploaded to Cloud Server and carried out matching primitives.Concrete matching process is as follows:
First by finger print information C to be verified feach the sample fingerprint information (C stored with Cloud Server hs, C r, Index) all calculate its relative distance, computing formula is as follows:
P F i = C h i × C F × C R = H × D i × M 1 × M 1 - 1 × k × F c × M 2 × M 2 - 1 × R T = H × D i × k × F c × R T = kΣ j = 1 n + 1 b s j * b c j
Suppose there be m sample fingerprint, fingerprint b at Cloud Server cfor fingerprint to be verified.Then b ccan generate m relative distance with the finger print information in Sample Storehouse is P ic, wherein (1≤i≤m)
Then when matching primitives, suppose that there is b in sample fingerprint storehouse iand b z, wherein (1≤i, z≤m, and i ≠ z), then with b crelative distance is respectively P icand P zc, calculate its difference known:
P i c - P s c = k ( Σ j = 1 n b s j * b c j - 0.5 ( Σ j = 1 n b i j 2 ) )
= k ( Σ j = 1 n b z j * b c j - 0.5 ( Σ j = 1 n b z j 2 ) ) = 0.5 k ( dist x c - dist i c )
From above formula, by the difference of relative distance, the inverse value of the difference of 0.5k actual distance doubly can be translated into.If P iG-P zc> 0, then imply that dist zc-dist ic> 0, i.e. P iwith P fcompare, P imore close with fingerprint to be verified.Therefore, when mating, only relative distance need be found maximum wherein (1≤i≤m), the sample fingerprint vector that can obtain closest to fingerprint to be verified is b i.Because that Cloud Server stores is b icorresponding finger print information (C i, C h, C r, Index), can be obtained closest to fingerprint b by matching primitives iindex Index.
Database owner finds corresponding sample fingerprint vector to calculate Euclidean distance with fingerprint vector to be verified according to index, and compares with the threshold value set in advance, and result feedback is to client the most at last.
If Euclidean distance is less than or equal to threshold value, just by the information displaying of user out, if be greater than threshold value, then authentication failed is pointed out.
So far, once complete fingerprint identification process completes.
Carry out proof to the correctness of fingerprint recognition encryption and decryption security algorithm of the present invention below to describe.In order to verify the fail safe of native system, whether conspire with Cloud Server assuming that there is threat modeling for assailant.
First suppose that assailant does not conspire with Cloud Server:
When assailant does not conspire with Cloud Server, now assailant's attack database owner, can obtain (C hi, C r), if assailant can obtain key M by known quantity 1, M 2, H, R, then this algorithm is regarded as unsafe.By the relevant equations of above already described known quantity, known:
C h i = H × D i × M 1 C R = M 2 - 1 × R T I n d e x
U = M 1 × M 1 - 1 U = M 2 × M 2 - 1
Whether lower surface analysis can obtain key by known quantity.
If attempt solving key M 1, then by occur in literary composition about M 1equation is listed.
C h i = H × D i × M 1 U = M 1 × M 1 - 1
By the Prerequisite of prerequisite, known C hi(being (n+1) × (n+1) matrix), U (for (n+1) × (n+1) unit matrix), known quantity is 2 (n+1) × (n+1).
Unknown D i(being (n+1) × (n+1) matrix), (being (n+1) × (n+1) matrix), unknown quantity is 2 (n+1) × (n+1)+(n+1).
By known quantity < unknown quantity, according to mathematics general knowledge, knownly solve M by above-mentioned formula 1impossible, therefore key M 1safe.
In like manner, for M 2can equation be listed:
C R = M 2 - 1 &times; R T U = M 2 &times; M 2 - 1
Known quantity < unknown quantity can be obtained, therefore M by analysis similar to the above 2all cannot obtain.
For key H, equation C can be listed hi=H × D i× M i, known C hi(being (n+1) vector), known quantity is (n+1).
Unknown D i, M 1(being (n+1) × (n+1) matrix), unknown quantity is 2 (n+1) × (n+1).
Known quantity < unknown quantity, can demonstrate,prove solution and not go out H.
In like manner, for key R, equation is had according to the analysis to key H, same solution does not go out R.
By upper analysis, when assailant does not conspire with Cloud Server, are only the keys that impossible solve in this algorithm according to the data in database owner.
Next is hypothesize attack person and Cloud Server are conspired:
Now (C in assailant's known sample fingerprint base hi, C r, Index) and fingerprint C to be verified p, suppose a kind of more extreme situation, assailant can as a legal client, and so assailant can construct i fingerprint C to be verified fi, for checking fingerprint C each time fi, all can introduce a new unknown quantity k i.Might as well suppose to conspire t time (t >=n+2), utilize the relation of matrix and equation group to obtain:
Wherein, P i=C fi× C r, P ifor i-th column vector of P, 1≤i≤t.In this programme, known, to solve we need to know K -1, but the non-zero entry of K is random generation, cannot complete in polynomial time so enumerate R.Therefore assailant cannot solve any secret fingerprint characteristic data can not be recovered.
From above-mentioned embodiment, in whole fingerprint identification process, the fingerprint vector relating to fingerprint privacy all never occurs with plaintext version in Cloud Server and transmitting procedure, thus has ensured fail safe and the confidentiality of fingerprint.And provide fingerprint authentication recognition function safely and effectively, thus, cloud computing technology has been applied in fingerprint recognition system safely.
The above is only the preferred embodiment of the present invention; should be understood that; for those skilled in the art; under the premise without departing from the principles of the invention; some improvement can also be made; or carry out equivalent replacement to wherein portion of techniques feature, these improve and replace and also should be considered as protection scope of the present invention.

Claims (6)

1., based on a security fingerprint recognition system for cloud computing, comprise client, database owner and Cloud Server three part, wherein,
Client, is configured with vectorial extraction module, by fingerprint vector extraction algorithm API, fingerprint image is extracted as the vector of regular length and is uploaded to database owner;
Database owner, be configured with fingerprint vector encrypting module, this module comprises sample fingerprint encryption submodule and encrypting fingerprint submodule to be verified, when receiving sample fingerprint vector from client, utilizes sample fingerprint encryption submodule to be encrypted and be uploaded to Cloud Server and stores; When receiving fingerprint vector to be verified, encrypting fingerprint submodule to be verified is utilized to be encrypted and to be uploaded to Cloud Server;
Cloud Server, the information that is configured with stores and matching primitives module, stores when receiving the sample fingerprint vector information after encryption from database owner; When receiving the fingerprint vector information to be verified after encryption, data in the fingerprint vector information to be verified of the data in this fingerprint vector information to be verified received and storage are carried out matching primitives, return index, database owner finds out corresponding sample fingerprint vector according to this index, Euclidean distance computing is carried out with fingerprint vector to be verified, and compare with threshold value, return results to client.
2. system according to claim 1, first described client is carried out process by extraction algorithm API to fingerprint image and is obtained sample fingerprint vector b=[b 1, b 2,, b n], its (n+1) position is expanded to obtain vectorial b s, the matrix A of stochastic generation (n+1) × (n+1), makes D=[A 1* b s1, A 2* b s2,, A n+1* b s (n+1)], sample fingerprint vector is just hidden in matrix D thus.
3. system according to claim 1, described database owner's module utilizes sample fingerprint encryption submodule to be encrypted and be uploaded to Cloud Server and stores, and specifically comprises:
C h i = C H &times; C i = H &times; M 1 - 1 &times; M 1 &times; D &times; M 2 = H &times; D &times; M 2 C R = M 2 - 1 &times; R T I n d e x I n d e x
Wherein M 1, M 2, H, R are the key of system, M 1, M 2for the matrix of (n+1) × (n+1), H, R are the random vector of (n+1), and Index is the index that sample fingerprint vector is corresponding, by these information (C hi, C r, Index) be uploaded to Cloud Server and store after packing.
4., based on a security fingerprint recognition methods for cloud computing, the method comprises the steps:
Client, by fingerprint vector extraction algorithm API, is extracted as the vector of regular length and is uploaded to database owner by fingerprint image;
When receiving sample fingerprint vector from client, database owner utilizes sample fingerprint encryption submodule to be encrypted and be uploaded to Cloud Server and stores; When receiving fingerprint vector to be verified from client, database owner utilizes encrypting fingerprint submodule to be verified be encrypted and be uploaded to Cloud Server;
When receiving the sample fingerprint vector information after encryption from database owner, Cloud Server stores; When receiving the fingerprint vector information to be verified after encryption, data in the fingerprint vector information to be verified of the data in this fingerprint vector information to be verified received and storage are carried out matching primitives by Cloud Server, return index, database owner finds out corresponding sample fingerprint vector according to this index, Euclidean distance computing is carried out with fingerprint vector to be verified, and compare with threshold value, return results to client.
5. system according to claim 4, first described client is carried out process by extraction algorithm API to fingerprint image and is obtained sample fingerprint vector b=[b 1, b 2,, b n], its (n+1) position is expanded to obtain vectorial b s, the matrix A of stochastic generation (n+1) × (n+1), makes D=[A 1* b s1, A 2* b s2,, A n+1* b s (n+1)], sample fingerprint vector is just hidden in matrix D thus.
6. system according to claim 5, described database owner's module utilizes sample fingerprint encryption submodule to be encrypted and be uploaded to Cloud Server and stores, and specifically comprises:
C h i = C H &times; C i = H &times; M 1 - 1 &times; M 1 &times; D &times; M 2 = H &times; D &times; M 2 C R = M 2 - 1 &times; R T I n d e x I n d e x
Wherein M 1, M 2, H, R are the key of system, M 1, M 2for the matrix of (n+1) × (n+1), H, R are the random vector of (n+1), and Index is the index that sample fingerprint vector is corresponding, by these information (C hi, C r, Index) be uploaded to Cloud Server and store after packing.
CN201510946531.4A 2015-12-18 2015-12-18 Safety fingerprint identification system and method based on cloud computing Pending CN105553980A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510946531.4A CN105553980A (en) 2015-12-18 2015-12-18 Safety fingerprint identification system and method based on cloud computing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510946531.4A CN105553980A (en) 2015-12-18 2015-12-18 Safety fingerprint identification system and method based on cloud computing

Publications (1)

Publication Number Publication Date
CN105553980A true CN105553980A (en) 2016-05-04

Family

ID=55832916

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510946531.4A Pending CN105553980A (en) 2015-12-18 2015-12-18 Safety fingerprint identification system and method based on cloud computing

Country Status (1)

Country Link
CN (1) CN105553980A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106101801A (en) * 2016-07-21 2016-11-09 赵国良 Security fingerprint identification system based on cloud computing
CN106487786A (en) * 2016-09-30 2017-03-08 陕西师范大学 A kind of cloud data integrity verification method based on biological characteristic and system
CN109936584A (en) * 2017-12-15 2019-06-25 天津铂创国茂电子科技发展有限公司 The method of fingerprint recognition and speech recognition based on cloud branch server
CN110022292A (en) * 2018-12-28 2019-07-16 阿里巴巴集团控股有限公司 A kind of processing method and system of user data
CN110892693A (en) * 2017-05-11 2020-03-17 维尔蒂姆知识产权有限公司 System and method for biometric identification

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201904809U (en) * 2010-12-20 2011-07-20 惠州紫旭科技有限公司 Data service system based on cloud computing
CN103441844A (en) * 2013-07-31 2013-12-11 南京神盾信息技术有限公司 Data safety and intranet monitoring system based on cloud storage
CN103546544A (en) * 2013-09-30 2014-01-29 张家港市速达电子商务有限公司 Data management system on basis of cloud computing
CN104318146A (en) * 2014-10-08 2015-01-28 无锡指网生物识别科技有限公司 Fingerprint-identification-based cloud storage method
CN104468842A (en) * 2014-12-31 2015-03-25 国网甘肃省电力公司信息通信公司 Power grid equipment state information cloud storage system and data uploading and downloading methods thereof
CN104733008A (en) * 2015-04-07 2015-06-24 俞晓东 Mobile storage equipment capable of realizing cloud storage based on fingerprint identification
CN104980477A (en) * 2014-04-14 2015-10-14 航天信息股份有限公司 Data access control method and system in cloud storage environment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201904809U (en) * 2010-12-20 2011-07-20 惠州紫旭科技有限公司 Data service system based on cloud computing
CN103441844A (en) * 2013-07-31 2013-12-11 南京神盾信息技术有限公司 Data safety and intranet monitoring system based on cloud storage
CN103546544A (en) * 2013-09-30 2014-01-29 张家港市速达电子商务有限公司 Data management system on basis of cloud computing
CN104980477A (en) * 2014-04-14 2015-10-14 航天信息股份有限公司 Data access control method and system in cloud storage environment
CN104318146A (en) * 2014-10-08 2015-01-28 无锡指网生物识别科技有限公司 Fingerprint-identification-based cloud storage method
CN104468842A (en) * 2014-12-31 2015-03-25 国网甘肃省电力公司信息通信公司 Power grid equipment state information cloud storage system and data uploading and downloading methods thereof
CN104733008A (en) * 2015-04-07 2015-06-24 俞晓东 Mobile storage equipment capable of realizing cloud storage based on fingerprint identification

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ANIL K.JAIN等: ""Filterbank-based fingerprint matching"", 《IEEE TRANSACTIONS ON IMAGE PROCESSING》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106101801A (en) * 2016-07-21 2016-11-09 赵国良 Security fingerprint identification system based on cloud computing
CN106487786A (en) * 2016-09-30 2017-03-08 陕西师范大学 A kind of cloud data integrity verification method based on biological characteristic and system
CN106487786B (en) * 2016-09-30 2020-03-20 陕西师范大学 Cloud data integrity verification method and system based on biological characteristics
CN110892693A (en) * 2017-05-11 2020-03-17 维尔蒂姆知识产权有限公司 System and method for biometric identification
CN109936584A (en) * 2017-12-15 2019-06-25 天津铂创国茂电子科技发展有限公司 The method of fingerprint recognition and speech recognition based on cloud branch server
CN110022292A (en) * 2018-12-28 2019-07-16 阿里巴巴集团控股有限公司 A kind of processing method and system of user data

Similar Documents

Publication Publication Date Title
US9571268B2 (en) Method and system for homomorphicly randomizing an input
CN107147652B (en) A kind of safety fusion authentication method of the polymorphic identity of user based on block chain
CN105553980A (en) Safety fingerprint identification system and method based on cloud computing
CN100399737C (en) Method of data protection
CN104917617B (en) A kind of encryption group ranking obscures method
JP4929136B2 (en) Biometric authentication method, apparatus and system
CN106790303B (en) The data integrity verification method completed in cloud storage by third party
Barman et al. Fingerprint-based crypto-biometric system for network security
CN105046234B (en) Facial image secret recognition methods in cloud environment based on rarefaction representation
EP3134994B1 (en) Method of obfuscating data
CN106533697B (en) Generating random number and extracting method and its application in authentication
CN107276752A (en) The methods, devices and systems that limitation key is decrypted are paid to cloud
CN104092686B (en) The method of secret protection and Data Access Security based on SVM classifier
CN106096548A (en) A kind of many intelligent terminal based on cloud environment share face secret recognition methods
CN109145829A (en) A kind of safe and efficient face identification method based on deep learning and homomorphic cryptography
Jin et al. Privacy preserving face identification in the cloud through sparse representation
CN107426172A (en) The matching method for pushing and device of a kind of identity information
CN109583219A (en) A kind of data signature, encryption and preservation method, apparatus and equipment
CN107819578B (en) It can verify that outsourcing solution label decryption method and its system based on attribute
US7424114B2 (en) Method for enhancing security of public key encryption schemas
Veeraragavan et al. Enhanced encryption algorithm (EEA) for protecting users' credentials in public cloud
CN111475690B (en) Character string matching method and device, data detection method and server
US9356786B2 (en) Method for encrypting a plurality of data in a secure set
JP5799635B2 (en) Encrypted data search system, device, method, and program
Wong et al. A privacy-preserving biometric matching protocol for iris codes verification

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160504